Chapter 5: Network security technologies Flashcards
Which systems are designed to monitor network traffic and other events, and look for anything suspicious that might indicate an attack?
Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
What intrusion detection method examines traffic by comparison to a profile of how its protocol is supposed to work
Stateful protocol analysis
Which intrusion detection method uses heuristic methods that look for behaviors which seems unusual relative to the normal baseline. It has the ability to identify zero day attacks.
Anomaly based
What term refers to the combination of AAA systems with network segmentation and host-level security?
Network Access Control (NAC)
What is the term for appliances, hardware or software designed to transparently combine distributed services into a single virtual whole?
Load Balancing
Which load balancing technique moves the processing overhead associated with SSL or TLS encryption to another server or a hardware appliance with accelerate encryption features?
SSL acceleration
Which load balancing technique reduces the bandwidth required by some kinds of data traffic
Data compression
Which load balancing technique monitors each server in the load balancing pool, then removes it if it fails
Health checking
Which load balancing technique moves resource intensive TCP services to different servers than those performing server application functions
TCP offloading
Which load balancing technique is similar to QOS, and allows some traffic to be prioritized
Priority queuing
Which load balancing technique allows the balancer to store frequently accessed content?
Content caching
Which load balancer configuration makes sure that incoming connections are spread evenly throughout servers without overloading any of them?
scheduling
Which load balancer configuration allows “sticky” sessions to enable traffic fro the same user to go to the same server to maintain session integrity?
sessions
Which load balancer failover technique keeps all redundant servers active and sharing the load?
active/active
Which load balancer failover technique keeps multiple failover nodes on standby?
active/passive
Which proxy mediates communications between LAN clients and Internet servers. It requires client side configuration, and is often used in small, heavily secured networks.
Forward proxy
Which proxy operates like forward proxies, but don’t require client side configuration?
Transparent proxies (also known as forced proxies)